{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:55:25Z","timestamp":1769738125624,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319458700","type":"print"},{"value":"9783319458717","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_20","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T08:25:24Z","timestamp":1472113524000},"page":"323-342","source":"Crossref","is-referenced-by-count":26,"title":["Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method"],"prefix":"10.1007","author":[{"given":"Dongpeng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"20_CR1","unstructured":"Arboit, G.: A method for watermarking Java programs via opaque predicates. In: Proceedings of 5th International Conference on Electronic Commerce Research (ICECR-5) (2002)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware usingcontrol-flow graph matching. In: Proceedings of Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2006) (2006)","DOI":"10.1007\/11790754_8"},{"issue":"2","key":"20_CR3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MSP.2007.31","volume":"5","author":"D Bruschi","year":"2007","unstructured":"Bruschi, D., Martignoni, L., Monga, M.: Code normalization for self-mutating malware. IEEE Secur. Priv. 5(2), 46\u201354 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Cappaert, J., Preneel, B.: A general model for hiding control flow. In: Proceedings of the 10th Annual ACM Workshop on Digital Rights Management (DRM 2010) (2010)","DOI":"10.1145\/1866870.1866877"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Yuan, L., Wu, X., Zang, B., Huang, B., Yew, P.C.: Control flow obfuscation with information flow tracking. In: Proceedings of the 42nd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 42) (2009)","DOI":"10.1145\/1669112.1669162"},{"key":"20_CR6","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. The University of Auckland, Technical report (1997)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1998) (1998)","DOI":"10.1145\/268946.268962"},{"issue":"4","key":"20_CR8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmark-a tool for software protection research. IEEE Secur. Priv. 1(4), 40\u201349 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR9","volume-title":"Software Engineering Metrics and Models","author":"SD Conte","year":"1986","unstructured":"Conte, S.D., Dunsmore, H.E., Shen, V.Y.: Software Engineering Metrics and Models. Benjamin-Cummings Publishing Co. Inc., REdwood City (1986)"},{"issue":"4","key":"20_CR10","first-page":"24:1","volume":"9","author":"B Coppens","year":"2013","unstructured":"Coppens, B., De Sutter, B., Maebe, J.: Feedback-driven binary code diversification. ACM Trans. Architect. Code Optim. (TACO) 9(4), 24:1\u201324:26 (2013)","journal-title":"ACM Trans. Architect. Code Optim. (TACO)"},{"key":"20_CR11","unstructured":"Drape, S.: Intellectual property protection using obfuscation. Technical report, RR-10-02, Oxford University Computing Laboratory (2010)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Hind, M., Pioli, A.: Which pointer analysis should i use?. In: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2000), pp. 113\u2013123. ACM (2000)","DOI":"10.1145\/347324.348916"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM - software protection for the masses. In: Proceedings of the 1st International Workshop on Software Protection (SPRO 2015) (2015)","DOI":"10.1109\/SPRO.2015.10"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Kovacheva, A.: Efficient code obfuscation for Android. Master\u2019s thesis, University of Luxembourg (2013)","DOI":"10.1007\/978-3-319-03783-7_10"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Larsen, P., Homescu, A., Brunthaler, S., Franz, M.: SoK: automated software diversity. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP 2014) (2014)","DOI":"10.1109\/SP.2014.25"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis and transformation. In: Proceedings of the International Symposium on Code Generation and Optimization (CGO 2004) (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"20_CR17","unstructured":"Madou, M.: Application security through program obfuscation. Ph.D. thesis, Ghent University (2007)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Madou, M., Van Put, L., De Bosschere, K.: LOCO: an interactive code (de)obfuscation tool. In: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM 2006) (2006)","DOI":"10.1145\/1111542.1111566"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Ming, J., Xu, D., Wang, L., Wu, D.: LOOP: logic-oriented opaque predicate detection in obfuscated binary code. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015) (2015)","DOI":"10.1145\/2810103.2813617"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Proceedings of the 23th Annual Computer Security Applications Conference (ACSAC 2007), December 2007","DOI":"10.1109\/ACSAC.2007.21"},{"issue":"2","key":"20_CR21","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10660-006-6955-z","volume":"6","author":"G Myles","year":"2006","unstructured":"Myles, G., Collberg, C.: Software watermarking via opaque predicates: implementation, analysis, and attacks. Electron. Commer. Res. 6(2), 155\u2013171 (2006)","journal-title":"Electron. Commer. Res."},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., Zhang, Y.: Experience with software watermarking. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000) (2000)","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"20_CR23","unstructured":"Preda, M.D., Madou, M., Bosschere, K.D., Giacobazzi, R.: Opaque predicate detection by abstract interpretation. In: Proceedings of 11th International Conference on Algebriac Methodology and Software Technology (AMAST 2006) (2006)"},{"key":"20_CR24","first-page":"21","volume":"1","author":"KA Roundy","year":"2012","unstructured":"Roundy, K.A., Miller, B.P.: Binary-code obfuscations in prevalent packer tools. ACM J. Name 1, 21 (2012)","journal-title":"ACM J. Name"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Udupa, S.K., Debray, S.K., Madou, M.: Deobfuscation: Reverse engineering obfuscated code. In: Proceedings of the 12th Working Conference on Reverse Engineering (WCRE 2005) (2005)","DOI":"10.1109\/WCRE.2005.13"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C., Hill, J., Knight, J.C., Davidson, J.W.: Protection of software-based survivability mechanisms. In: Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (2001)","DOI":"10.1109\/DSN.2001.941405"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:15:54Z","timestamp":1568330154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}